Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

FCP - FortiMail 7.4 Administrator Question and Answers

FCP - FortiMail 7.4 Administrator

Last Update Oct 15, 2025
Total Questions : 53

We are offering FREE FCP_FML_AD-7.4 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare FCP_FML_AD-7.4 free exam questions and then go for complete pool of FCP - FortiMail 7.4 Administrator test questions that will help you more.

FCP_FML_AD-7.4 pdf

FCP_FML_AD-7.4 PDF

$42  $104.99
FCP_FML_AD-7.4 Engine

FCP_FML_AD-7.4 Testing Engine

$50  $124.99
FCP_FML_AD-7.4 PDF + Engine

FCP_FML_AD-7.4 PDF + Testing Engine

$66  $164.99
Questions 1

Refer to the exhibits, which show a topology diagram (Topology) and a configuration element (IP Policy).

An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the mail server starts filling up with undeliverable email.

Which two changes must theadministrator make to fix this issue? (Choose two.)

Options:

A.  

Disable the exclusive flag in IP policy ID 1.

B.  

Apply a session profile with sender reputation disabled on a separate IP policy for outbound sessions.

C.  

Clear the sender reputation database using the CLI.

D.  

Create an outbound recipient policy to bypass outbound email from session profile inspections.

Discussion 0
Questions 2

Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 ConfigurationandFML2 Configuration).

What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?

Options:

A.  

FML1 will fail to establish any connection with FML2.

B.  

FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.

C.  

FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.

D.  

FML1 will successfully establish an SMTPS session with FML2.

Discussion 0
Questions 3

Refer to the exhibit, which shows a topology diagram of two MTAs.

MTA-1 is delivering an email intended for User 1 to MTA-2. User 1 uses Outlook as an email client. Which two statements about protocol usage between these devices are correct? (Choose two.)

Options:

A.  

User 1 will use IMAP or POP3 to download the email message from MTA-2.

B.  

MTA-2 will use IMAP to download the email message from MTA-1.

C.  

MTA-1 will use SMTP to deliver the email message to MTA-2.

D.  

MTA-1 will use POP3 to deliver the email message to User 1 directly.

Discussion 0
Questions 4

Refer to the exhibit which shows a detailed history log view.

Which two actions did FortiMail take on this email message? (Choose two.)

Options:

A.  

FortJMail replaced the virus content with a message

B.  

FortiMail modified the subject of the email message.

C.  

FortiMail forwarded the email to User 1 without scanning.

D.  

FortiMail sent the email message to User 1's personal quarantine.

Discussion 0
Questions 5

Refer to the exhibit which shows a command prompt output of a telnet command.

Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?

Options:

A.  

Change the host name

B.  

Add a protected domain

C.  

Configure a local domain name

D.  

Change the operation mode

Discussion 0
Questions 6

Refer to the exhibit which displays a topology diagram.

Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)

Options:

A.  

If port1. is required to process SMTP traffic, it must be configured as a routed interface.

B.  

All bridge member interfaces belong to the same subnet as the management IP.

C.  

The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.

D.  

Any bridge member interface can be removed from the bridge and configured as a routed interface.

Discussion 0
Questions 7

Refer to the exhibit, which displays a history log entry.

In the Policy ID column, why isthe last policy ID value SYSTEM?

Options:

A.  

The email was dropped by a system blacklist.

B.  

The email matched a system-level authentication policy.

C.  

It is an inbound email.

D.  

The email did not match a recipient-based policy.

Discussion 0
Questions 8

Exhibit.

Reter to the exhibit, which shows the IBE Encryption page of a FortiMail device. Which user account behavior can you expect from these IBE settings?

Options:

A.  

After initial registration. IBE users can access the secure portal without authenticating again for 90 days.

B.  

Registered IBE users have 90 days from the time they receive a notification email message to access their IBE email.

C.  

IBE user accounts will expire after 90 days of inactivity and must register again to access new IBE email message.

D.  

First time IBE users must register to access their email within 90 days of receiving the notification email message

Discussion 0
Questions 9

Reter to the exhibits.

The exhibits display a topologydiagram of a FortiMail cluster (Topology) and the primary HA interface configuration of the Primary FortiMail (HA Interface Configuration)

Which three actions are recommended when configuring the primary FortiMail HA interface? (Choose three.)

Options:

A.  

In the Heartbeat status drop-down list, select Primary

B.  

In the Virtual IP action drop-down list, select Use

C.  

In the Virtual IP address field, type 172.16.32.55/24

D.  

In the Peer IP address field, type 172.16.32.57

E.  

Disable Enable port monitor

Discussion 0
Questions 10

A FortiMail device is configured with the protected domain example. com.

It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

Options:

A.  

MALL FROM: mis@hosted.r.et RCPTTO: noc@exampIe.com

B.  

MALL FROM: accounts@example.com RCPT TO: aales8biz.example.com

C.  

MALL FROM: support6example.org RCPT TO: marketing9exainple.com

D.  

MALL FROM: trainingeexample.com RCPT TO: students@external.org

Discussion 0
Questions 11

Which SMTP command lists (he supported SMTP service extensions of the recipient MTA?

Options:

A.  

DATA

B.  

VRFY

C.  

EHLO

D.  

HELO

Discussion 0
Questions 12

In which two ways does a transparent mode FortiMail use the build-it MTA to process email? (Choose two.)

Options:

A.  

It can queue undeliverable messages and generate DSNs.

B.  

The built-in MTA must connect to an external relay host to deliver email.

C.  

MUAs must be configured to connect to the built-in MTA to send email.

D.  

It ignores the destination set by the sender and uses its own MX record lookup.

Discussion 0
Questions 13

Refer to the exhibit.

What does the Scan timeout value configure?

Options:

A.  

How long FortiMail will waitfor a scan result from FortiSandbox

B.  

How often the local scan results cache will expire on FortiMail

C.  

How often FortiMail will query FortiSandbox for a scan result

D.  

How long FortiMail will wait to send a file or URI to FortiSandbox

Discussion 0
Questions 14

Exhibit.

Refer to the exhibits, which show an email archiving configuration (Email Archiving 1 and Email Archiving 2) from a FortiMail device.

What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)

Options:

A.  

FortiMail will save archived email in the journal account.

B.  

FortiMail will archive email sent from marketingexample. com.

C.  

FortiMail will exempt spam email from archiving.

D.  

FortiMail will allow only the marketingeexample.com account to access the archived email.

Discussion 0
Questions 15

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas. Which FortiMail feature specific to server mode can be used to accomplish this?

Options:

A.  

Access profiles

B.  

Domain-level service settings

C.  

Resource profiles.

D.  

Email group profiles

Discussion 0